SlideShare a Scribd company logo
Conducting a Security
Vulnerability Assessment
Agenda	





•  Introductions	

•  Definitions	

•  Why an Assessment	

•  Methodology
Definitions	



       •  Vulnerability: the state of being exposed or
          susceptible to harm or injury	

       •  Vulnerability Assessment: ongoing, critical
         evaluation to identify potential risks and
         areas of weakness that could have
         adverse consequences for institutions and
         their systems	

S
Definitions	




       •  Hazards Assessment: focuses on
          general hazards to determine what
          hazards you might be prone to.	

       •  Risk Analysis: focuses on risk levels
          and consequences	



S
Why An Assessment	



       •  The Campus Landscape	

       •  Legal Obligations	

         ü  Case Law	

       •  Post Incident Reports	

         ü  Most notably those from institutions, state
             and Federal gov’t, & professional associations 	



S
Campus Safety Landscape


       •  High-risk drinking         •  Fire and life safety
       •  Illegal and prescription   •  Mental illness and
          drug use and abuse            suicide
       •  Violence                   •  Food poisoning, food-
                                        borne illness, pandemic
         -  VAW
                                     •  Terrorist threats
         -  Criminal intrusions,
            including rampage
            shooters
       •  Natural disasters

S
Campus Safety Landscape
Legal Obligations	




       •  You own/control premises	

       •  You operate programs, on and off campus	

       •  You have “special relationships” with
          students	

       •  Laws and regulations 	



G
Mullins v. Pine Manor College	



       •  1983 case involving an assault on a female student
          on campus by a non-student assailant	

         ü Massachusetts Supreme Court found the college
           liable for negligent security. 	

        	

 "Parents, students and the general community still
            have a reasonable expectation, fostered in part by
            the colleges themselves, that 	

reasonable care will
              be exercised to protect resident students from
                            foreseeable harm."	

G
After-Action Reports	


       •  More than 20 state reports following Virginia
          Tech tragedy	

         ü VT Report, State of Florida, California	

       •  Report to the President	

       •  Several professional association reports 	

         ü Notably National Association of Attorneys
            General; IACLEA Blueprint	

G
After-Action Reports	



       •  These reports all recommended
          institutions conduct a risk or vulnerability,
          assessment:	

        	

 	

“…each college and university (should)
            	

conduct a critical infrastructure
            	

assessment using trained security
            	

specialists.” (Florida Gubernatorial Task
            	

Force for University Campus Safety)	

G
Organizational Framework	

       FEMA’s 4 Phases of Emergency Management	





G
Methodology	





G
Environment Scan	



       •  Internal assessment	

         ü  ID critical infrastructure and other facilities	

         ü  ID perceived threats and vulnerabilities from
             key constituents (remember Law of
             Diminishing Returns)	

         ü  Catalog findings (threats to people, property,
             natural acts, terrorism)	



S
Environment Scan	



       •  External assessment	

         ü  Crime on/around campus – reported and
             unreported	

           ² Perception of safety/fear of crime	

           ² Crime in local area	

         ü  AOD issues	

         ü  VAW	


S
Physical Security Systems	



       •  Review campus physical security systems	

         ü  Perimeter – fence or other boundary,
             cameras	

         ü  Building Perimeter - access control, cameras	

         ü  Interior – intrusion alarms, panic/duress
             alarms, cameras	



S
Policies, Procedures & Education	


       •  Human Resources	

       •  Residential Living	

       •  Workplace Violence	

       •  Training and Awareness	

       •  Violence Against Women Prevention Policies	

       •  Drugs, Alcohol and Weapons	

       •  Access Control	

       •  EAP	

G
Response Capacity	




       •  Campus public safety entity 	

       •  All Hazards Emergency Management – Concept of
          Operations	

         ü  Evacuation	

       •  Mass, Emergency Notification & Timely Warning	

       •  MOU/MOA	


G
Risk=VCT	



       •  Vulnerability	

       •  Consequence	

       •  Threat	





         1	

                          125	



G
Justifying the Assessment	




•  ROI	

•  Avoiding Hyperbole	

•  Advocating for All Hazards
4 C’s	





•  Collaborate	

•  Communicate	

•  Coordinate	

•  Capitalize
Contact	




  www.Margolis-Healy.com	

 shealy@margolis-healy.com	

gmargolis@margolis-healy.com	

       1-866-817-5817

More Related Content

What's hot

Styk uclan nov 13
Styk uclan nov 13Styk uclan nov 13
Styk uclan nov 13
thevigor
 
A Practical Look at Legal Issues in Emergency Management
A Practical Look at Legal Issues in Emergency Management A Practical Look at Legal Issues in Emergency Management
A Practical Look at Legal Issues in Emergency Management
Partners in Emergency Preparedness Conference
 
Comprehensive safety-planning
Comprehensive safety-planningComprehensive safety-planning
Comprehensive safety-planning
Faisal Shahriman
 
Title IX Education, Training & Proactive Measures HBCU 2012
Title IX Education, Training & Proactive Measures HBCU 2012Title IX Education, Training & Proactive Measures HBCU 2012
Title IX Education, Training & Proactive Measures HBCU 2012
Margolis Healy
 
Region XII NAFSA Presentation Prevention and Response to Harm and Sexual Assault
Region XII NAFSA Presentation Prevention and Response to Harm and Sexual AssaultRegion XII NAFSA Presentation Prevention and Response to Harm and Sexual Assault
Region XII NAFSA Presentation Prevention and Response to Harm and Sexual Assault
Isela Pena-Rager
 
Clery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues ConferenceClery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues Conference
Margolis Healy
 
VA Campus Safety Forum - Clery & IBRS - What The Numbers Tell Us
VA Campus Safety Forum - Clery & IBRS - What The Numbers Tell UsVA Campus Safety Forum - Clery & IBRS - What The Numbers Tell Us
VA Campus Safety Forum - Clery & IBRS - What The Numbers Tell Us
Margolis Healy
 
Remaining Trauma-Informed in an Era of Changing Title IX Regulations
Remaining Trauma-Informed in an Era of Changing Title IX RegulationsRemaining Trauma-Informed in an Era of Changing Title IX Regulations
Remaining Trauma-Informed in an Era of Changing Title IX Regulations
National Center for Campus Public Safety
 
Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019
National Center for Campus Public Safety
 
Conducting concurrent titleix_and_criminal_investigations
Conducting concurrent titleix_and_criminal_investigationsConducting concurrent titleix_and_criminal_investigations
Conducting concurrent titleix_and_criminal_investigations
Margolis Healy
 
Comprehensive safety planning meeting of the minds april 3, 2014
Comprehensive safety planning meeting of the minds april 3, 2014Comprehensive safety planning meeting of the minds april 3, 2014
Comprehensive safety planning meeting of the minds april 3, 2014
Margolis Healy
 

What's hot (11)

Styk uclan nov 13
Styk uclan nov 13Styk uclan nov 13
Styk uclan nov 13
 
A Practical Look at Legal Issues in Emergency Management
A Practical Look at Legal Issues in Emergency Management A Practical Look at Legal Issues in Emergency Management
A Practical Look at Legal Issues in Emergency Management
 
Comprehensive safety-planning
Comprehensive safety-planningComprehensive safety-planning
Comprehensive safety-planning
 
Title IX Education, Training & Proactive Measures HBCU 2012
Title IX Education, Training & Proactive Measures HBCU 2012Title IX Education, Training & Proactive Measures HBCU 2012
Title IX Education, Training & Proactive Measures HBCU 2012
 
Region XII NAFSA Presentation Prevention and Response to Harm and Sexual Assault
Region XII NAFSA Presentation Prevention and Response to Harm and Sexual AssaultRegion XII NAFSA Presentation Prevention and Response to Harm and Sexual Assault
Region XII NAFSA Presentation Prevention and Response to Harm and Sexual Assault
 
Clery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues ConferenceClery Primer 2012 UVM Legal Issues Conference
Clery Primer 2012 UVM Legal Issues Conference
 
VA Campus Safety Forum - Clery & IBRS - What The Numbers Tell Us
VA Campus Safety Forum - Clery & IBRS - What The Numbers Tell UsVA Campus Safety Forum - Clery & IBRS - What The Numbers Tell Us
VA Campus Safety Forum - Clery & IBRS - What The Numbers Tell Us
 
Remaining Trauma-Informed in an Era of Changing Title IX Regulations
Remaining Trauma-Informed in an Era of Changing Title IX RegulationsRemaining Trauma-Informed in an Era of Changing Title IX Regulations
Remaining Trauma-Informed in an Era of Changing Title IX Regulations
 
Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019Just in Time: Clery Act Tips Before Fall 2019
Just in Time: Clery Act Tips Before Fall 2019
 
Conducting concurrent titleix_and_criminal_investigations
Conducting concurrent titleix_and_criminal_investigationsConducting concurrent titleix_and_criminal_investigations
Conducting concurrent titleix_and_criminal_investigations
 
Comprehensive safety planning meeting of the minds april 3, 2014
Comprehensive safety planning meeting of the minds april 3, 2014Comprehensive safety planning meeting of the minds april 3, 2014
Comprehensive safety planning meeting of the minds april 3, 2014
 

Viewers also liked

Es systar webinar_capacityassessment_20131008
Es systar webinar_capacityassessment_20131008Es systar webinar_capacityassessment_20131008
Es systar webinar_capacityassessment_20131008
Jean-Pierre Fayolle
 
Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...
Margolis Healy
 
Now Is the Time: The President’s Plan - Fact Sheet
Now Is the Time: The President’s Plan - Fact SheetNow Is the Time: The President’s Plan - Fact Sheet
Now Is the Time: The President’s Plan - Fact Sheet
Margolis Healy
 
Title IX - Focusing on the Important SCCLEA
Title IX  - Focusing on the Important SCCLEATitle IX  - Focusing on the Important SCCLEA
Title IX - Focusing on the Important SCCLEA
Margolis Healy
 
Margolis Healy Clery Center 2013 Clery Compliance Talking Papers
Margolis Healy Clery Center 2013 Clery Compliance Talking PapersMargolis Healy Clery Center 2013 Clery Compliance Talking Papers
Margolis Healy Clery Center 2013 Clery Compliance Talking Papers
Margolis Healy
 
Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...
Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...
Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...
Margolis Healy
 
The White House - Gun Violence Reduction Executive Actions
The White House - Gun Violence Reduction Executive ActionsThe White House - Gun Violence Reduction Executive Actions
The White House - Gun Violence Reduction Executive Actions
Margolis Healy
 
Margolis Healy Campus Threat Assessment Case Studies: A Training Tool
Margolis Healy Campus Threat Assessment Case Studies: A Training ToolMargolis Healy Campus Threat Assessment Case Studies: A Training Tool
Margolis Healy Campus Threat Assessment Case Studies: A Training Tool
Margolis Healy
 
2012 URMIA-ThreatCampusViolenceSpecialEvents
2012 URMIA-ThreatCampusViolenceSpecialEvents2012 URMIA-ThreatCampusViolenceSpecialEvents
2012 URMIA-ThreatCampusViolenceSpecialEvents
Margolis Healy
 
Active Shooter Exercise Presentation, 2013 SCCLEA Conference
Active Shooter Exercise Presentation, 2013 SCCLEA ConferenceActive Shooter Exercise Presentation, 2013 SCCLEA Conference
Active Shooter Exercise Presentation, 2013 SCCLEA Conference
Margolis Healy
 

Viewers also liked (10)

Es systar webinar_capacityassessment_20131008
Es systar webinar_capacityassessment_20131008Es systar webinar_capacityassessment_20131008
Es systar webinar_capacityassessment_20131008
 
Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...Florida Association of Community Colleges, Council of Student Affairs Present...
Florida Association of Community Colleges, Council of Student Affairs Present...
 
Now Is the Time: The President’s Plan - Fact Sheet
Now Is the Time: The President’s Plan - Fact SheetNow Is the Time: The President’s Plan - Fact Sheet
Now Is the Time: The President’s Plan - Fact Sheet
 
Title IX - Focusing on the Important SCCLEA
Title IX  - Focusing on the Important SCCLEATitle IX  - Focusing on the Important SCCLEA
Title IX - Focusing on the Important SCCLEA
 
Margolis Healy Clery Center 2013 Clery Compliance Talking Papers
Margolis Healy Clery Center 2013 Clery Compliance Talking PapersMargolis Healy Clery Center 2013 Clery Compliance Talking Papers
Margolis Healy Clery Center 2013 Clery Compliance Talking Papers
 
Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...
Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...
Clery Act Implications for Violence Against Women Crimes, Margolis Healy & As...
 
The White House - Gun Violence Reduction Executive Actions
The White House - Gun Violence Reduction Executive ActionsThe White House - Gun Violence Reduction Executive Actions
The White House - Gun Violence Reduction Executive Actions
 
Margolis Healy Campus Threat Assessment Case Studies: A Training Tool
Margolis Healy Campus Threat Assessment Case Studies: A Training ToolMargolis Healy Campus Threat Assessment Case Studies: A Training Tool
Margolis Healy Campus Threat Assessment Case Studies: A Training Tool
 
2012 URMIA-ThreatCampusViolenceSpecialEvents
2012 URMIA-ThreatCampusViolenceSpecialEvents2012 URMIA-ThreatCampusViolenceSpecialEvents
2012 URMIA-ThreatCampusViolenceSpecialEvents
 
Active Shooter Exercise Presentation, 2013 SCCLEA Conference
Active Shooter Exercise Presentation, 2013 SCCLEA ConferenceActive Shooter Exercise Presentation, 2013 SCCLEA Conference
Active Shooter Exercise Presentation, 2013 SCCLEA Conference
 

Similar to Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

Module 5 Risk Management and Control.pptx
Module 5 Risk Management and Control.pptxModule 5 Risk Management and Control.pptx
Module 5 Risk Management and Control.pptx
Mrinal24523
 
Unit 5.pptx
Unit 5.pptxUnit 5.pptx
Unit 5.pptx
BrawinJeyaramJ1
 
safety-orientation-powerpoint.pdf
safety-orientation-powerpoint.pdfsafety-orientation-powerpoint.pdf
safety-orientation-powerpoint.pdf
Rajan Kumar
 
Professional ethics-Unit4
Professional ethics-Unit4Professional ethics-Unit4
Professional ethics-Unit4
LovelitJose
 
م.52-مبادرة#تواصل_تطوير-م.عاطف عبدالرحمن-الأمن والسلامة .تقيم المخاطر والإدارة
م.52-مبادرة#تواصل_تطوير-م.عاطف عبدالرحمن-الأمن والسلامة .تقيم المخاطر والإدارةم.52-مبادرة#تواصل_تطوير-م.عاطف عبدالرحمن-الأمن والسلامة .تقيم المخاطر والإدارة
م.52-مبادرة#تواصل_تطوير-م.عاطف عبدالرحمن-الأمن والسلامة .تقيم المخاطر والإدارة
Egyptian Engineers Association
 
Spengler chap03
Spengler chap03Spengler chap03
Spengler chap03
medinajg
 
Accident and prevention - Types - management.
Accident and prevention - Types - management.Accident and prevention - Types - management.
Accident and prevention - Types - management.
Shanky Phlp
 
Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015
Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015
Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015
Connie Vaughn
 
SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –
AMIT SAHU
 
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
AMIT SAHU
 
CapTech Talks Webinar April 2023 Joshua Sinai.pptx
CapTech Talks Webinar April 2023 Joshua Sinai.pptxCapTech Talks Webinar April 2023 Joshua Sinai.pptx
CapTech Talks Webinar April 2023 Joshua Sinai.pptx
CapitolTechU
 
Introduction.137697294749987.OS
Introduction.137697294749987.OSIntroduction.137697294749987.OS
Introduction.137697294749987.OS
Eiyla Hamdan
 
Dos grad orienation presentation f2013
Dos   grad orienation presentation  f2013Dos   grad orienation presentation  f2013
Dos grad orienation presentation f2013
Kelicia Samuelson
 
AEE Investigations 2009.ppt
AEE Investigations 2009.pptAEE Investigations 2009.ppt
AEE Investigations 2009.ppt
RAJATGUPTA124056
 
Active Shooter Situations in the Workplace
Active Shooter Situations in the WorkplaceActive Shooter Situations in the Workplace
Active Shooter Situations in the Workplace
Human Capital Media
 
4 Fire and Life Safety - Risk Management - 4
4 Fire and Life Safety - Risk Management - 44 Fire and Life Safety - Risk Management - 4
4 Fire and Life Safety - Risk Management - 4
SOCUTD
 
Professional Ethics in computing
Professional Ethics in computing Professional Ethics in computing
Professional Ethics in computing
LydiaMonoi
 
Threat and risks management absg2
Threat and risks management absg2Threat and risks management absg2
Threat and risks management absg2
Martin Brown
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the Vulnerabilities
Roger Johnston
 
Caveon webinar lessons learned at atp and nces
Caveon webinar lessons learned at atp and ncesCaveon webinar lessons learned at atp and nces
Caveon webinar lessons learned at atp and nces
Caveon Test Security
 

Similar to Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC (20)

Module 5 Risk Management and Control.pptx
Module 5 Risk Management and Control.pptxModule 5 Risk Management and Control.pptx
Module 5 Risk Management and Control.pptx
 
Unit 5.pptx
Unit 5.pptxUnit 5.pptx
Unit 5.pptx
 
safety-orientation-powerpoint.pdf
safety-orientation-powerpoint.pdfsafety-orientation-powerpoint.pdf
safety-orientation-powerpoint.pdf
 
Professional ethics-Unit4
Professional ethics-Unit4Professional ethics-Unit4
Professional ethics-Unit4
 
م.52-مبادرة#تواصل_تطوير-م.عاطف عبدالرحمن-الأمن والسلامة .تقيم المخاطر والإدارة
م.52-مبادرة#تواصل_تطوير-م.عاطف عبدالرحمن-الأمن والسلامة .تقيم المخاطر والإدارةم.52-مبادرة#تواصل_تطوير-م.عاطف عبدالرحمن-الأمن والسلامة .تقيم المخاطر والإدارة
م.52-مبادرة#تواصل_تطوير-م.عاطف عبدالرحمن-الأمن والسلامة .تقيم المخاطر والإدارة
 
Spengler chap03
Spengler chap03Spengler chap03
Spengler chap03
 
Accident and prevention - Types - management.
Accident and prevention - Types - management.Accident and prevention - Types - management.
Accident and prevention - Types - management.
 
Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015
Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015
Women in Cybersecurity_InfraGard Cybersecurity Symposium_11.17.2015
 
SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –SAFETY MANAGAMENT PLAN –
SAFETY MANAGAMENT PLAN –
 
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...Ppt for IMPROVEMENT OF SAFETY   THROUGH    SAFETY MANAGAMENT PLAN –  office p...
Ppt for IMPROVEMENT OF SAFETY THROUGH SAFETY MANAGAMENT PLAN – office p...
 
CapTech Talks Webinar April 2023 Joshua Sinai.pptx
CapTech Talks Webinar April 2023 Joshua Sinai.pptxCapTech Talks Webinar April 2023 Joshua Sinai.pptx
CapTech Talks Webinar April 2023 Joshua Sinai.pptx
 
Introduction.137697294749987.OS
Introduction.137697294749987.OSIntroduction.137697294749987.OS
Introduction.137697294749987.OS
 
Dos grad orienation presentation f2013
Dos   grad orienation presentation  f2013Dos   grad orienation presentation  f2013
Dos grad orienation presentation f2013
 
AEE Investigations 2009.ppt
AEE Investigations 2009.pptAEE Investigations 2009.ppt
AEE Investigations 2009.ppt
 
Active Shooter Situations in the Workplace
Active Shooter Situations in the WorkplaceActive Shooter Situations in the Workplace
Active Shooter Situations in the Workplace
 
4 Fire and Life Safety - Risk Management - 4
4 Fire and Life Safety - Risk Management - 44 Fire and Life Safety - Risk Management - 4
4 Fire and Life Safety - Risk Management - 4
 
Professional Ethics in computing
Professional Ethics in computing Professional Ethics in computing
Professional Ethics in computing
 
Threat and risks management absg2
Threat and risks management absg2Threat and risks management absg2
Threat and risks management absg2
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the Vulnerabilities
 
Caveon webinar lessons learned at atp and nces
Caveon webinar lessons learned at atp and ncesCaveon webinar lessons learned at atp and nces
Caveon webinar lessons learned at atp and nces
 

More from Margolis Healy

Title IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA Amendments
Title IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA AmendmentsTitle IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA Amendments
Title IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA Amendments
Margolis Healy
 
MHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy PresentationMHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy Presentation
Margolis Healy
 
Building a compliant clery act program updated june3 2200
Building a compliant clery act program updated june3 2200Building a compliant clery act program updated june3 2200
Building a compliant clery act program updated june3 2200
Margolis Healy
 
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Margolis Healy
 
VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote
Margolis Healy
 
Building & Facilitating a Comprehensive Clery Compliance Program
Building & Facilitating a Comprehensive Clery Compliance ProgramBuilding & Facilitating a Comprehensive Clery Compliance Program
Building & Facilitating a Comprehensive Clery Compliance Program
Margolis Healy
 
UNC Title IX Training Seminar, FEB 2013
UNC Title IX Training Seminar, FEB 2013UNC Title IX Training Seminar, FEB 2013
UNC Title IX Training Seminar, FEB 2013
Margolis Healy
 
MHA How Safe Are Our Campuses??
MHA How Safe Are Our Campuses??MHA How Safe Are Our Campuses??
MHA How Safe Are Our Campuses??
Margolis Healy
 
MHA Stalking Presentation for Clery Center 25th Anniversary Program
MHA Stalking Presentation for Clery Center 25th Anniversary ProgramMHA Stalking Presentation for Clery Center 25th Anniversary Program
MHA Stalking Presentation for Clery Center 25th Anniversary Program
Margolis Healy
 
MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012
Margolis Healy
 
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
Margolis Healy
 
CCP Focus Group HBCU 2012
CCP Focus Group HBCU 2012CCP Focus Group HBCU 2012
CCP Focus Group HBCU 2012
Margolis Healy
 
Setting the Stage HBCU 2012
Setting the Stage HBCU 2012Setting the Stage HBCU 2012
Setting the Stage HBCU 2012
Margolis Healy
 
Legislative Minefield HBCU 2012
Legislative Minefield HBCU 2012Legislative Minefield HBCU 2012
Legislative Minefield HBCU 2012
Margolis Healy
 
Managing the modern cps department
Managing the modern cps departmentManaging the modern cps department
Managing the modern cps department
Margolis Healy
 
MHA sexual & gender violence presentation ccaw 2012 - 032612
MHA sexual & gender violence presentation   ccaw 2012 - 032612MHA sexual & gender violence presentation   ccaw 2012 - 032612
MHA sexual & gender violence presentation ccaw 2012 - 032612
Margolis Healy
 
MHA defining roles presentation in gender and sexual response on campus - 032612
MHA defining roles presentation in gender and sexual response on campus - 032612MHA defining roles presentation in gender and sexual response on campus - 032612
MHA defining roles presentation in gender and sexual response on campus - 032612
Margolis Healy
 
The Interconnected Nature of Gender and Sexual Violence Crimes: How to Build...
 The Interconnected Nature of Gender and Sexual Violence Crimes: How to Build... The Interconnected Nature of Gender and Sexual Violence Crimes: How to Build...
The Interconnected Nature of Gender and Sexual Violence Crimes: How to Build...
Margolis Healy
 

More from Margolis Healy (18)

Title IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA Amendments
Title IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA AmendmentsTitle IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA Amendments
Title IX, Meet Clery, Clery Meet Title IX: Implementing the VAWA Amendments
 
MHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy PresentationMHA USAA 2014 Summer Academy Presentation
MHA USAA 2014 Summer Academy Presentation
 
Building a compliant clery act program updated june3 2200
Building a compliant clery act program updated june3 2200Building a compliant clery act program updated june3 2200
Building a compliant clery act program updated june3 2200
 
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
Clery Update - IACLEA Southeast & Southwest Regional Conference Jan. 21, 2014
 
VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote VT School Safety Conference 2013 Keynote
VT School Safety Conference 2013 Keynote
 
Building & Facilitating a Comprehensive Clery Compliance Program
Building & Facilitating a Comprehensive Clery Compliance ProgramBuilding & Facilitating a Comprehensive Clery Compliance Program
Building & Facilitating a Comprehensive Clery Compliance Program
 
UNC Title IX Training Seminar, FEB 2013
UNC Title IX Training Seminar, FEB 2013UNC Title IX Training Seminar, FEB 2013
UNC Title IX Training Seminar, FEB 2013
 
MHA How Safe Are Our Campuses??
MHA How Safe Are Our Campuses??MHA How Safe Are Our Campuses??
MHA How Safe Are Our Campuses??
 
MHA Stalking Presentation for Clery Center 25th Anniversary Program
MHA Stalking Presentation for Clery Center 25th Anniversary ProgramMHA Stalking Presentation for Clery Center 25th Anniversary Program
MHA Stalking Presentation for Clery Center 25th Anniversary Program
 
MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012
 
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
FBI Bomb Data Center General Information Bulletin 2012-1: The Bomb Threat Cha...
 
CCP Focus Group HBCU 2012
CCP Focus Group HBCU 2012CCP Focus Group HBCU 2012
CCP Focus Group HBCU 2012
 
Setting the Stage HBCU 2012
Setting the Stage HBCU 2012Setting the Stage HBCU 2012
Setting the Stage HBCU 2012
 
Legislative Minefield HBCU 2012
Legislative Minefield HBCU 2012Legislative Minefield HBCU 2012
Legislative Minefield HBCU 2012
 
Managing the modern cps department
Managing the modern cps departmentManaging the modern cps department
Managing the modern cps department
 
MHA sexual & gender violence presentation ccaw 2012 - 032612
MHA sexual & gender violence presentation   ccaw 2012 - 032612MHA sexual & gender violence presentation   ccaw 2012 - 032612
MHA sexual & gender violence presentation ccaw 2012 - 032612
 
MHA defining roles presentation in gender and sexual response on campus - 032612
MHA defining roles presentation in gender and sexual response on campus - 032612MHA defining roles presentation in gender and sexual response on campus - 032612
MHA defining roles presentation in gender and sexual response on campus - 032612
 
The Interconnected Nature of Gender and Sexual Violence Crimes: How to Build...
 The Interconnected Nature of Gender and Sexual Violence Crimes: How to Build... The Interconnected Nature of Gender and Sexual Violence Crimes: How to Build...
The Interconnected Nature of Gender and Sexual Violence Crimes: How to Build...
 

Recently uploaded

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 

Recently uploaded (20)

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 

Conducting a Security Vulnerability Assessment, 2010 Valencia CC Presentation, Margolis Healy & Associates, LLC

  • 2. Agenda •  Introductions •  Definitions •  Why an Assessment •  Methodology
  • 3. Definitions •  Vulnerability: the state of being exposed or susceptible to harm or injury •  Vulnerability Assessment: ongoing, critical evaluation to identify potential risks and areas of weakness that could have adverse consequences for institutions and their systems S
  • 4. Definitions •  Hazards Assessment: focuses on general hazards to determine what hazards you might be prone to. •  Risk Analysis: focuses on risk levels and consequences S
  • 5. Why An Assessment •  The Campus Landscape •  Legal Obligations ü  Case Law •  Post Incident Reports ü  Most notably those from institutions, state and Federal gov’t, & professional associations S
  • 6. Campus Safety Landscape •  High-risk drinking •  Fire and life safety •  Illegal and prescription •  Mental illness and drug use and abuse suicide •  Violence •  Food poisoning, food- borne illness, pandemic -  VAW •  Terrorist threats -  Criminal intrusions, including rampage shooters •  Natural disasters S
  • 8. Legal Obligations •  You own/control premises •  You operate programs, on and off campus •  You have “special relationships” with students •  Laws and regulations G
  • 9. Mullins v. Pine Manor College •  1983 case involving an assault on a female student on campus by a non-student assailant ü Massachusetts Supreme Court found the college liable for negligent security. "Parents, students and the general community still have a reasonable expectation, fostered in part by the colleges themselves, that reasonable care will be exercised to protect resident students from foreseeable harm." G
  • 10. After-Action Reports •  More than 20 state reports following Virginia Tech tragedy ü VT Report, State of Florida, California •  Report to the President •  Several professional association reports ü Notably National Association of Attorneys General; IACLEA Blueprint G
  • 11. After-Action Reports •  These reports all recommended institutions conduct a risk or vulnerability, assessment: “…each college and university (should) conduct a critical infrastructure assessment using trained security specialists.” (Florida Gubernatorial Task Force for University Campus Safety) G
  • 12. Organizational Framework FEMA’s 4 Phases of Emergency Management G
  • 14. Environment Scan •  Internal assessment ü  ID critical infrastructure and other facilities ü  ID perceived threats and vulnerabilities from key constituents (remember Law of Diminishing Returns) ü  Catalog findings (threats to people, property, natural acts, terrorism) S
  • 15. Environment Scan •  External assessment ü  Crime on/around campus – reported and unreported ² Perception of safety/fear of crime ² Crime in local area ü  AOD issues ü  VAW S
  • 16. Physical Security Systems •  Review campus physical security systems ü  Perimeter – fence or other boundary, cameras ü  Building Perimeter - access control, cameras ü  Interior – intrusion alarms, panic/duress alarms, cameras S
  • 17. Policies, Procedures & Education •  Human Resources •  Residential Living •  Workplace Violence •  Training and Awareness •  Violence Against Women Prevention Policies •  Drugs, Alcohol and Weapons •  Access Control •  EAP G
  • 18. Response Capacity •  Campus public safety entity •  All Hazards Emergency Management – Concept of Operations ü  Evacuation •  Mass, Emergency Notification & Timely Warning •  MOU/MOA G
  • 19. Risk=VCT •  Vulnerability •  Consequence •  Threat 1 125 G
  • 20. Justifying the Assessment •  ROI •  Avoiding Hyperbole •  Advocating for All Hazards
  • 21. 4 C’s •  Collaborate •  Communicate •  Coordinate •  Capitalize
  • 22. Contact www.Margolis-Healy.com shealy@margolis-healy.com gmargolis@margolis-healy.com 1-866-817-5817